Comments

This commit refactors how Stack Smashing Protection support is handled
in Buildroot:
*) It turns the BR2_TOOLCHAIN_BUILDROOT_USE_SSP option into an option
that only enables the SSP support in uClibc, when using the internal
toolchain backend.
*) It adds an hidden BR2_TOOLCHAIN_HAS_SSP option that gets enabled
when the toolchain has SSP support. Here we have the usual dance:
glibc/eglibc in internal/external backend always select this
option, in the case of uClibc/internal, it gets selected when
BR2_TOOLCHAIN_BUILDROOT_USE_SSP is enabled, in the case of
uClibc/external, there is a new configuration option that the user
must select (or not) depending on whether the toolchain has SSP
support.
*) It adds a new options BR2_ENABLE_SSP in the "Build options" menu,
to enable the usage of SSP support, by adding
-fstack-protector-all to the CFLAGS.
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
---
Config.in | 17 +++++++++++++++++
package/Makefile.in | 2 +-
package/psmisc/psmisc.mk | 2 +-
package/uclibc/Config.in | 10 ++++++++++
toolchain/Config.in | 1 +
toolchain/helpers.mk | 3 ++-
toolchain/toolchain-buildroot/Config.in.2 | 9 ---------
toolchain/toolchain-common.in | 3 +++
toolchain/toolchain-external/Config.in | 9 +++++++++
9 files changed, 44 insertions(+), 12 deletions(-)